← Zuruck zu CVEs
CVE-2023-38994
HIGH7.9
Beschreibung
The 'check_univention_joinstatus' prometheus monitoring script (and other scripts) in UCS 5.0-5 revealed the LDAP plaintext password of the machine account in the process list allowing attackers with local ssh access to gain higher privileges and perform followup attacks. By default, the configuration of UCS does not allow local ssh access for regular users.
CVE Details
CVSS v3.1 Bewertung7.9
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht10/31/2023
Zuletzt geandert4/15/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
univention:univention_corporate_server
Schwachen (CWE)
CWE-668
Referenzen
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(cve@mitre.org)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(cve@mitre.org)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324(af854a3a-2127-422b-91ae-364da2661108)
https://forge.univention.org/bugzilla/show_bug.cgi?id=56324#c0(af854a3a-2127-422b-91ae-364da2661108)
https://www.drive-byte.de/en/blog/simple-yet-effective-the-story-of-some-simple-bugs-that-led-to-the-complete-compromise-of-a-network(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.